From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse fb 1a be
fb1abe909e9e6563095a726b0c27a2f2a1e5423e fb1abec79fad78f43a9efeb07897e3ad58c852aa fb1abec7b6c4688a8a926ac13250d58aabdd2235